CVE-2014-1642

Source
https://cve.org/CVERecord?id=CVE-2014-1642
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2014-1642.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2014-1642
Downstream
Published
2014-01-26T16:58:11Z
Modified
2026-04-10T03:43:36.544041Z
Summary
[none]
Details

The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.

References

Affected packages